20 Critical Security Controls

20 Critical Security Controls (20 CSC) SANS combined government-derived information security and real-life attacks in businesses of all sizes to inform appropriate defense. This created SANS original list of 10, which later became 20 critical security controls. These 20 Critical security controls are becoming more important everyday. Using these 20 CSC’s will make your organization…

Managed Service Providers

Managed Service Providers: Never have to worry about an issue again with 24×7 monitoring.   Managed service providers use remote monitoring and management tools to keep an eye on the performance and overall health of the IT infrastructure that powers your business operations. MSPs should be 24×7 and should quickly respond to any issue that…

Disaster Recovery

Disaster Recovery: Don’t let a negatively impacting event affect your organization Disaster Recovery is the ability to preserve an organizations data and systems through a negatively impacting event. With the onset of cloud computing, disaster recovery has become more efficient and affordable than ever. Today it is possible to back up data in minutes vs.…

Cyber-Killchain

Cyber-Killchain The process of a cyber-killchain is much like the process of an everyday burglar. These burglars take multiple steps before they actually rob your home, car, or business. The killchain is the common steps that are used by these cyber-burglars. This being the case, it’s important for defenders to pay attention and use the…

Ransomware

RANSOMWARE: CYBER-THUGS WANT YOUR BITCOIN Ransomware is a malicious software created by cyber-thugs who got picked on when they were young. These cyber-thugs are an organization that can’t get any money from their country so they prey on the US. Most RW variants are coming out of Russia, Ukraine, North Korea, China and India. Extorting…

The Critical Security Controls – Control 6

Control 6: – A framework for an offense-informed defense   We’ve covered Controls 1 through Control 5 of the 20 Critical Security Controls. This blog will focus on Control 6 and will complete our coverage of the “Basic Controls”, those which represent the most basic of cyber “hygiene”. The 20 Critical Controls use an offense-informs-defense…

The Critical Security Controls – Control 5

Control 5:   A framework for an offense-informed defense.  As we discussed in our earlier blog posts on the 20 Critical Security Controls, they provide an offense-informs-defense framework through which an organization can effectively defend against cyberattacks.  In this installment, we’re examining Control Five.  This control is one of the ‘Basic control’ and represents the…

The Critical Security Controls – Control 4

Control 4:  A framework for an offense-informed defense.    As we discussed in our earlier blog posts on the 20 Critical Security Controls, they provide an offense-informs-defense framework through which an organization can effectively defend against cyberattacks.  In this installment, we’re examining Control Four. This control is a ‘Basic control’ and represents one which every…

Ransomware and other Destructive Malware

Ransomware and other Destructive Malware; It Makes You WannaCry   Ransomware is often considered the scourge of the cyber-business community. It’s damaging, disruptive, and outright unwelcome. That is unless you are the criminal behind the malware. At the intersection of two leading-edge technologies – Cryptography and Cryptocurrency – exists exceptional opportunity. The opportunity to develop…

The Critical Security Controls – Control 3

Control 3: A Framework for an Offense-informed Defense As we discussed in our earlier blog posts on the 20 Critical Security Controls, they provide an offense-informs-defense framework through which an organization can effectively defend against cyberattacks.  In this installment, we’re examining Control Three. This control is a ‘Basic control’ and represents one which every organization,…